EP0029894B1 - Système pour réaliser une vérification sûre d'un mot de passe - Google Patents

Système pour réaliser une vérification sûre d'un mot de passe Download PDF

Info

Publication number
EP0029894B1
EP0029894B1 EP80106085A EP80106085A EP0029894B1 EP 0029894 B1 EP0029894 B1 EP 0029894B1 EP 80106085 A EP80106085 A EP 80106085A EP 80106085 A EP80106085 A EP 80106085A EP 0029894 B1 EP0029894 B1 EP 0029894B1
Authority
EP
European Patent Office
Prior art keywords
card
key
terminal
encryption
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
EP80106085A
Other languages
German (de)
English (en)
Other versions
EP0029894A3 (en
EP0029894A2 (fr
Inventor
Paul Edward Stuckert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of EP0029894A2 publication Critical patent/EP0029894A2/fr
Publication of EP0029894A3 publication Critical patent/EP0029894A3/en
Application granted granted Critical
Publication of EP0029894B1 publication Critical patent/EP0029894B1/fr
Expired legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • G07F7/0886Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code

Definitions

  • the present invention presents a system in which the valid possession of a personal identification card is established when the person provides a key which is identical to a key which is electronically stored in the card.
  • the card itself is similar to that described in U.S.-A-3,806,874 of Kurt Ehrat, entitled "Identification System for Individuals".
  • An essential feature of such a card is that it be so constructed that it is virtually impossible for anyone to either alter the circuitry in the card or to in any way either detect or alter the informational content of said card and circuitry other than in a manner which is intended by the design of the card.
  • CARD The credit card-like device or token
  • a CARD The credit card-like device or token
  • Such a CARD could be utilized at a bank's cash issuing terminal, a teller operated terminal, a point of sale terminal in a department store, or an identification terminal located at a physical facility.
  • the person holding the CARD enter a memorized number via a keyboard into the identification system.
  • This number is then utilized as an encryption key as will be understood from the following description. While the number is, in essence, a personal identification number or PIN, in view of the use of the number in the present system, it will be referred to herein as the asserted key.
  • This asserted key is in contrast with a true key permanently stored in the CARD.
  • the asserted key is memorized and must be entered by the person into the U/I Terminal.
  • the key stored in the CARD will be referred to subsequently as the true key.
  • the asserted key and the true key will be specifically called "the key KA” and "the key KT" respectively.
  • a personal portable terminal device is utilized by the person to interface between the CARD and U/I Terminal.
  • the personal portable terminal device performs both an interface function between the CARD and the U/I Terminal and also provides a keyboard for entering the key K A into the system.
  • the term "XATR" will be utilized to refer to such terminal.
  • the CARD is first placed in a XATR which is then placed in a data exchange relationship with a U/I Terminal such as a Point of Sale Terminal (POST), or the like, at the facility where the person wishes to establish his identity.
  • a U/I Terminal such as a Point of Sale Terminal (POST), or the like
  • POST Point of Sale Terminal
  • the XATR is provided with a keyboard which allows the person to enter his memorized key K A into the system with minimum exposure to unauthorized copying or retention.
  • a XATR is disclosed in detail in GB-A-2,011,671.
  • a random word is produced by the system, which random word is simultaneously encrypted under the key, K TI and the key, K A , entered at a keyboard by the person.
  • the results of the encryptions of this random word are subsequently compared to determine if the two keys are the same. If they are, the person presenting the card is considered to be properly identified.
  • the true key, K T permanently stored within the CARD is never available outside of the CARD, i.e., only the random word encrypted under K T is available outside of the CARD.
  • the keyboard entered key, K AI is not available to the U/I Terminal, only the random word encrypted under said key is.
  • a personal identification system which includes the combination of a CARD which is issued to a person and a U/I Terminal.
  • the CARD is so constructed that access to secure data stored therein is impossible. Any alteration of the functional operation of the circuitry contained therein subsequent to manufacture or issuance is also prevented.
  • the CARD contains at least a secure storage means for a key K T unique to the person, means for generating or obtaining a random word to be encrypted under said key, K T , a key-controlled block-cipher encryption device, and means for transferring the encrypted random word to a U/I Terminal for subsequent comparison.
  • the U/I Terminal provided at the utilization entity includes the following functional components:
  • the XATR in the present system provides a keyboard which is under the control of the person entering an asserted key K A .
  • the XATR also serves as a communication, data, and control interface between the CARD and U/I Terminal.
  • the circuit configuration of the CARD is modified so that the encryption of the random word under both the true key K T stored in the CARD and under the key K A are both performed within the CARD.
  • the two versions of the encrypted random word are both transferred to the U/I Terminal and to a comparison circuit located therein, wherein an affirmative comparison indicates that the proper asserted key K A has been entered by the person.
  • the person gains greater security because his asserted key K A never passes into the U/I Terminal.
  • the utilization entity in order for the utilization entity to have adequate protection it should be understood that it is of greatest importance that the CARD carried by the individual be unalterable in data content, circuit function or data paths.
  • the system would be compromised.
  • means are provided for disabling the CARD in the event of an attempted unauthorized use should the card be lost or stolen.
  • Circuitry is provided within the CARD to electronically disable the CARD in the event of one or more unsuccessful comparison operations. The number of comparison failures necessary to cause disabling of the CARD would be predetermined by the system designers. In this way a number of legitimate mistakes by a person entering his key K A would be permitted.
  • Figs. 1, 2 and 3 only the significant functional units of the system are disclosed. These are the significant storage registers and functional elements such as the encryption blocks, random word generators, and the comparison and catenation circuits.
  • the gates for transmitting data between registers or between registers and functional units and their operation are considered obvious to a digital circuit designer.
  • the sequential controls could comprise a system clock including a number of interconnected single shot circuits or a small microprocessor having an associated microprogrammed memory for effecting the various sequential operations required.
  • the control of the functional units within the CARD could either be accomplished by a microprocessor or a system clock physically located within the CARD wherein the operation is initiated by a single control pulse from the U/I Terminal or alternatively all of the control functions could be performed by a microprocessor located within the U/I Terminal and transmitted to the CARD via the interface between the Card and the Terminal.
  • the XATR device functions primarily as a communication path for both data and control information.
  • the power for operating the circuitry within the CARD would optimally be obtained via inductive coupling between the CARD and the XATR, rather than being carried directly within the CARD.
  • Typical circuitry and interconnection means for such coupling are set forth in the above-identified publication.
  • the required key length for the FIPS 'Data Encryption Standard' is 56 binary bits.
  • Such a binary key is derived from a decimal keyboard entry by decimal to binary conversion employing conversion algorithms well-known in the art.
  • a 'compare' in block 217 of the terminal would indicate that the person holding the CARD was a properly identifed person.
  • a 'no compare' would indicate that an unauthorized person was attempting to use the CARD or that the person's memorized key K A was improperly entered.
  • communication between the CARD and the U/I Terminal could be by a number of means well-known in the art. These include direct connection, as indicated, inductive coupling, or the like. It is also assumed that the circuitry within the CARD would be powered inductively from a power source in the U/I Terminal, rendering the CARD less bulky. Similarly, the control sequences could be performed by either a series of sequential single shot circuits or by a small microprocessor and control store therefor which could be located either within the CARD or in the U/I Terminal and connected to the CARD via appropriate control lines as will be well- understood by those skilled in the art.
  • the person first places his CARD on or in a U/I Terminal, which in the embodiment of Fig. 1 is a retailer's Point of Sale Terminal (POST). Communication between the CARD and the U/I Terminal is established. First, the person enters his key K A via the keyboard 201 in the U/I Terminal. At this point all activity by the person ceases.
  • POST Point of Sale Terminal
  • the CARD delivers the contents of key storage register 1045, which is the true key K T to the key input of the encryption device 115
  • the U/I Terminal delivers the keyboard entered key K A from the keyboard 201, as the asserted key input to the encryption device 215 (identical to 115).
  • the CARD delivers a random word from the Random Word Generator 107 to one input of exclusive OR circuit 116 located on the CARD and to one input of the exclusive OR circuit 216 located in the U/I Terminal
  • Random Word Generator 207 delivers random word RW2 simultaneously as the second input to exclusive OR circuit 116 in the card and to exclusive OR circuit 216 in the U/I Terminal.
  • the two exclusive OR circuits 116 and 216 located on the CARD and in the U/I Terminal respectively, deliver the same composite random word to their respective encryption devices 115 and 215, as the data input.
  • the two encryption operations are performed substantially simultaneously and the output of the encryption device 115 is stored in register 108 as the true encrypted random word (ERWT).
  • the output from encryption device 215 is stored in register 208 as the asserted encrypted random word (ERWA).
  • the two compare units simultaneously reach 'valid' or 'invalid' decisions based on ERWT and ERWA. If a 'valid' decision is reached, the person has entered the proper key K A at the keyboard and he is properly identified for whatever transaction he wished to consummate at the U/I Terminal.
  • the output of encryption device 115 could be simultaneously transferred into compare unit 117 and 217 respectively, and the output of encryption device 215 could be simultaneously transferred to compare unit 217 and 117.
  • Both of these alternate embodiments require that the CARD be absolutely unalterable to prevent the person fraudulently retransmitting ERWA back to the U/I Terminal and thus force a compare in compare unit 217. This subject will be discussed later with respect to the embodiment of Fig. 2.
  • registers 108, 109 and 208, 209 could be dispensed with and the two encrypted random words ERWT and ERWA forwarded directly to the compare circuits 117 and 217, other changes could be made in the system without departing from the scope of the invention.
  • Another possible alteration would be to dispense with the generation of the two random words RW1 and RW2 and replace same with a single random word generator within the CARD or U/I Terminal which word is delivered to both encryption devices 115 and 215.
  • Fig. 2 an alternative embodiment of the invention is disclosed wherein the person has a personal portable transaction device, or XATR, at his disposal which has means for interfacing with the CARD and with the U/I Terminal.
  • the line A-A' again refers to the interface between the U/I Terminal and the XATR and CARD combination, i.e., the person and the Retailer.
  • the XATR is indicated by the outer dashed line to the left of the interface line A-A' and the CARD and its circuitry are indicated by the inner dashed line.
  • the XATR provides a keyboard 101 for entering the key K A which is totally within the control of the person presenting the CARD.
  • the XATR provides the communication or interface function between the CARD located therein and the U/I Terminal.
  • the operations performed by the encryption circuitry, etc., in the embodiment of Fig. 2 are essentially the same as those of Fig. 1.
  • the principal exception to this is that the distribution of functions between the CARD and U/I Terminal is different.
  • the key K A' which is entered via the keyboard 101 never passes into the Terminal. Consequently, the second encryption device, shown in Fig. 2 as 114B, is located in the CARD. Again, the circuitry within the CARD may not be altered in any way by the person to who said CARD is issued.
  • the operation of the system is as follows. With the CARD in position in the XATR and the XATR appropriately connected to the U/I Terminal, a transaction initiation button is actuated. The person enters the key K A into the keyboard 101 of the XATR. K A is communicated to the encryption device 114B as the key input. Simultaneously, the key K T stored in register 1045 is gated as the key input to the encryption device 114A.
  • Fig. 2 prevents what would be a relatively simple alteration of the XATR by a person owning same and wishing to defraud the retailer.
  • the person could cause the output from register 208 to be delivered directly to register 209.
  • the compare circuit 217 would always give a successful comparison regardless of what key K A the person entered at the keyboard 101.
  • the contents of registers 208 and 209 are compared in unit 217 and if successful the identification of the person is assumed correct and if unsuccessful either a mistake has been made, i.e., the wrong key entered, or the person is an imposter.
  • register 108 stores the true encrypted random word and register 208 stores the asserted encrypted random word.
  • the first enhancement of Fi g. 3 is the use of a special counter having a "disable CARD” output which will electronically “destroy” or “disable” a CARD which should no longer be used. Its operation will be apparent from the subsequent description of the figure.
  • the second feature described is the division of the key into high order and low order bits so that the key K A which must be memorized by the person may be considerably shortened.
  • the third feature involves the use of a special index (M) which may be selectively entered by the individual into a register in the CARD. This index is an offset whereby the key entered at the keyboard may be periodically changed without necessitating any change of the permanently stored key K T .
  • a block 125 is provided labeled Counter Protection having one output line to block 128 labeled 'Disable CARD'.
  • Two input lines are provided. The first is labeled “Increment” which emanates from register 104 where a quantity K T L is stored. This line produces a pulse each time register 104 is accessed. The second input from the compare block 117 marked “Reset” resets this counter to zero. This prevents someone finding or stealing a card, placing it in a XATR, and trying different keys K A until the correct one is found.
  • the counter protection circuit would be set at some predetermined count value.
  • This count value or threshold would allow a reasonable number of honest mistakes on the part of the person entering his key K A .
  • the register 104 is accessed and a pulse produced. Subsequently, with every successful compare between the registers 108 and 109 a pulse would be produced by 117 and the counter would be reset to zero. However, if a predetermined number of consecutive accesses of 104 should occur without a successful comparison by 117 a 'disable CARD' means 128 would be activated by the output from the Counter Protection block which would cause some "invalid" condition to occur in the CARD. This could take on a number of different forms such as, disabling the storage area for K T so it would not be available to the system.
  • the second feature of the circuitry shown in Fig. 3 is the division of the asserted key KA so that a smaller number of digits must be memorized by the person.
  • Catenation circuit 122 works in exactly the same way as 120, and forms the full asserted key K A which is provided as the key input to the encryption device 114B.
  • K T H is utilized to make up both the full true key K T and the full asserted key K A .
  • security is provided and the size of the key which must be remembered and entered correctly via the keyboard 101 is reduced.
  • This feature allows the person to periodically alter his asserted key K E to enhance security.
  • the presently disclosed invention has applicability for any situation where personal identification is of importance. It would have particular utility in the retail sales field where the retailer is obviously concerned that the individual seeking credit and having an apparently valid credit card is actually the person entitled to said credit card and thus to credit. Another significant area of potential commercial utilization of the invention is in the financial field and more particularly cash issuing terminals either manned or unmanned wherein a person presents the bank CARD and, upon proper identification, cash is issued to the individual.
  • the function of the CARD is not limited to personal identification transactions, but may well be extended to maintain records of particular business transactions. Thus, subsequent bookkeeping and electronic funds transfer operations utilizing transaction data recorded on the card are possible.
  • the CARD would be presented to a banking institution where the transaction data would be transferred to the person's account. In those cases where the transaction data was not previously forwarded to the bank by the U/I Terminal device, the CARD entered data would serve as the sole bookkeeping data input. Conversely, when the transaction data was previously forwarded to the bank the transaction data from the CARD could serve as a check to protect the person and warn him of any unauthorized use of his account or mistakes by the retailer.
  • the herein disclosed identification system provides a high degree of security for both the person holding the CARD and the entity which ultimately accepts said identification at a suitable U/I Terminal.
  • the system maintains security without recourse to a Host computer which might be subject to breakdown, communication outages, etc., and thus is capable of off-host operation without sacrificing reliability.

Claims (11)

1. Système d'identification personelle incluant la combinaison d'un objet en forme de carte de crédit (CARTE) devant être présentée par le porteur de la CARTE (personne), un terminal d'utilisation/d'identification (terminal U/I) auquel la CARTE est présentée à des fins d'identification, et une interface de transmission de données (A-A') permettant l'échange de données prédéterminées entre la CARTE et le terminal U/I, ladite combinaison étant caractérisée par:
des moyens (1045, 104/5) contenus dans ladite CARTE et servant à la mémorisation permanente d'un code secret KT, unique pour ladite personne,
des moyens de codage comprenant au moins un dispositif de codage (115, 114A/B) à blocs de chiffres commandé par un code et situé dans ladite CARTE,
un clavier (201, 101) a niveau duquel la personne peut introduire un code secret (KA), qui est correct s'il est identique au code mémorisé (KT),
au moins un générateur de mots aléatoires (107,207,106) servant à envoyer un mot d'entrée de données pour son codage par lesdits moyens de codage,
iesdits moyens de codage pouvant être tout d'abord actionnés de manière à coder un mot aleatoire envoyé par le générateur de Mots aléatoires avec le code mémorisé KT et, en second lieu, pouvant être actionné de manière à coder le même mot aléatoire avec ledit code secret KA introduit par la personne au niveau dudit clavier,
lesdits moyens de codage utilisant des algorithmes de codage identiques pendant chaque opération de codage,
des moyens de comparaison (217) situés dans ledit terminal et servant à comparer les résultats desdits premières et secondes opérations de codage,
et des moyens (ligne de sortie 217) servant à indiquer une comparaison réussie.
2. Système d'identification personelle selon la revendication 1, dans lequel lesdits moyens de codage comprennent un second dispositif de codage (215) à blocs de chiffres commandé par un code et situé dans ledit terminal U/I et possédant un fonctionnement identique au dispositif (115) de codage à blocs de chiffres commandé par un code, situé sur la CARTE, et dans lequel ledit clavier (220) est situé dans le terminal U/I, et des moyens (ligne de sortie 201) servant à envoyer le code secret KA introduit par la personne au moyen dudit clavier audit second dispositif cryptographique (215) en tant qu'entrée de code de ce dispositif pour réaliser ladite seconde opération de codage.
3. Système d'identification personelle selon la revendication 2, comportant un premier générateur de mots aléatoires (107) situés dans ladite CARTE et un second générateur de mots aléatoires (207) situé dans le terminal (U/1), des moyens (116 et/ou 216) servant à combiner les sorties des premier et second générateur de mots aléatoires pour produire un mot aléatoire résultant, et des moyens (lignes de sortie 116, 216) servant à envoyer le mot aléatoire résultant en tant qu'entrée de données à la fois auxdits premier et second dispositifs de codage (115,215).
4. Système d'identification personelle selon l'une des revendications 1-3, incluant des seconds moyens de comparaison (117) situés dans ladite CARTE pour comparer les sorties desdites première et seconde opérations de codage, des moyens formant compteur (125) situés dans ladite CARTE, et raccordés à la sortie desdits seconds moyens de comparaison (117) pour l'enregistrement du nombre de comparaisons irréussies détectées par lesdits seconds moyens de comparaison, et des moyens (128) pouvant être actionnés lorsque ledit compteur atteint une valur prédéterminée de manière à invalider ladite CARTE.
5. Système d'identification personelle selon la revendicattion 1, dans lequel ladite combinaison inclut un dispositif de transaction portable personnel (XATR) interposé entre ladite CARTE et ladite borne U/I, selon une relation d'échange de données avec ces deux éléments, ce que a pour effet que des données peuvert être transférées entre ladite CARTE et ledit terminal U/I, ledit clavier (101) étant situé à l'intérieur dudit XATR, et des MOYENS (connexion de sortie de 101) pour le transfert du code secret KA depuis le clavier aux moyens de codage, les voies de transfert de données à l'intérieur du XATR étant agencées de telle sorte que le code secret KA introduit au clavier n'est jamais disponible au niveau de l'interface de transmission des données (A-A') entre le XATR et le terminal.
6. Système d'identification personelle selon la revendication 1, dans lequel lesdits deux codes KT et KA sont subdivisés en deux segments, et les deux segments sont nécessaires pour le fonctionnement réussi des moyens de codage, ledit système incluant, à l'intérieur de la CARTE, des moyens (104, 105) servant à mémoriser ledit code KT en deux parties, et des moyens (120) servant à combiner lesdites deux parties pour envoyer le code complet KT, auxdits moyens de codage (1 14A), des moyens (102, 122) servant à introduire uniquement un segment (KAL) du code secret KA au niveau du XATR et à combiner, à l'intérieur de la CARTE, ledit segment introduit avec un segment prédéterminé (KTH) dudit code mémorisé KT et à envoyer le résultant de la combinaison en tant que code complet KA aux moyens respectifs de codage (114B).
7. Système d'identification personelle selon la revendication 5 ou 6, incluant des moyens (103), situés dans ladite CARTE, pour mémoriser une valeur d'index M qui, lorsqu'elle est combinée à une valeur KE introduite ultérieure de clavier (101), fournit une valeur résultante devant être utilisée comme code KA, et dans lequel ledsits moyens de combinaison comportent un circuit combinatoire prédéterminé et fixe (111), et des moyens permettant d'introduire de façon sélective une nouvelle valeur d'index dans ledit système par l'intermédiaire dudit clavier (101).
8. Système d'identification personelle selon l'une quelconque des revendications 1-7, caractérisé en outre par des moyens formant registre (208) situés dans ledit terminal U/I pour la mémorisation du mot aléatoire (ERWA), codé avec le code introduit KA, et des moyens formant registre (108) situés dans la carte pour la. mémorisation du ot aléatoire (ERWT) codé avec le code vrai KT, et des moyens (209) situés dans le terminal U/I et acceptant le mot codé (ERWT) mémorisé dans la CARTE et transféré au terminal U/I.
9. Système d'identification personelle selon les revendications 5 et 8, dans lequel des moyens sont prévus pour transférer le code KA introduire par le personne directement aux seconds moyens de codage (114B) situés a l'intérieur de la CARTE, pour le codage dudit mot aléatoire avec le code KA, et des moyens pour transférer la sortie desdits moyens de codage (114B) auxdits moyens formant registres (208) situés dans le terminal U/I.
10. Système d'identification personelle selon les revendications 8 et 9, incluant des moyens (sorties de 108, 208) pour le transfert des deux mots aléatoires codés (ERWA et ERWT) entre le terminal U/I et la CARTE simultanément dans le mode série par bit, mais dans des ordres opposés de poids der bits, ce qui a pour effet que toute tentative d'inversion du trajet d'un flux de données en provenance ou en direction du terminal provoque une comparaison négative des deux mots aléatoires codés, par lesdits moyens de comparaison (217).
11. Système d'identification personelle selon la revendication 4, incluant des moyens (117) pour ramener à zéro ledit compteur (125) chaque fois qu'une comparaison réussie se produit dans lesdits moyens de comparaison.
EP80106085A 1979-12-03 1980-10-07 Système pour réaliser une vérification sûre d'un mot de passe Expired EP0029894B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US99797 1979-12-03
US06/099,797 US4295039A (en) 1979-12-03 1979-12-03 Method and apparatus for achieving secure password verification

Publications (3)

Publication Number Publication Date
EP0029894A2 EP0029894A2 (fr) 1981-06-10
EP0029894A3 EP0029894A3 (en) 1981-07-15
EP0029894B1 true EP0029894B1 (fr) 1985-01-09

Family

ID=22276675

Family Applications (1)

Application Number Title Priority Date Filing Date
EP80106085A Expired EP0029894B1 (fr) 1979-12-03 1980-10-07 Système pour réaliser une vérification sûre d'un mot de passe

Country Status (6)

Country Link
US (1) US4295039A (fr)
EP (1) EP0029894B1 (fr)
JP (1) JPS5911950B2 (fr)
CA (1) CA1129028A (fr)
DE (1) DE3069942D1 (fr)
IT (1) IT1150969B (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE38419E1 (en) 1986-05-13 2004-02-10 Ncr Corporation Computer interface device

Families Citing this family (112)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2469760A1 (fr) * 1979-11-09 1981-05-22 Cii Honeywell Bull Procede et systeme d'identification de personnes demandant l'acces a certains milieux
DE3044984A1 (de) * 1979-11-30 1982-04-15 Dassault Electronique Integrierte transistorschaltung, insbesondere fuer codierung
FR2496294B1 (fr) * 1980-12-15 1987-01-02 Thomson Csf Dispositif protege d'authentification des utilisateurs d'un terminal de transmission de messages et systeme de transactions comportant de tels dispositifs
FR2497617B1 (fr) * 1981-01-07 1989-08-18 Transac Develop Transactions A Procede et dispositif de securite pour communication tripartie de donnees confidentielles
US4663710A (en) * 1981-05-15 1987-05-05 The Frymaster Corporation Intelligent cooking appliance
CA1176335A (fr) * 1981-06-05 1984-10-16 Exide Electronics Corporation Dispositif de controle des communications avec un ordinateur
FR2514593B1 (fr) * 1981-10-09 1986-12-26 Bull Sa Procede et dispositif pour authentifier la signature d'un message signe
IL64675A0 (en) * 1981-12-30 1982-03-31 Greenberg Avigdor Data verification system
DE3274396D1 (en) * 1982-02-11 1987-01-08 Powell William S Information communicating apparatus and method
FR2526977B1 (fr) * 1982-05-14 1988-06-10 Cii Honeywell Bull Procede et dispositif pour authentifier ou certifier au moins une information contenue dans une memoire d'un support electronique notamment amovible et portatif tel qu'une carte
FR2530053B1 (fr) * 1982-07-08 1986-04-25 Bull Sa Procede pour certifier la provenance d'au moins une information enregistree dans une memoire d'un premier dispositif electronique et transmise a un deuxieme dispositif electronique, et systeme pour la mise en oeuvre d'un tel procede
DE3225754A1 (de) * 1982-07-09 1984-01-12 Hülsbeck & Fürst GmbH & Co KG, 5620 Velbert Verfahren zur schliesswirksamen wechselwirkung eines schluesselartigen teils mit einem schlossartigen teil
US4757468A (en) * 1982-09-22 1988-07-12 Intel Corporation Authenticated read-only memory
DE3275604D1 (en) * 1982-12-30 1987-04-09 Ibm Testing the validity of identification codes
FR2539897B1 (fr) * 1983-01-20 1988-12-30 Cii Honeywell Bull Procede et dispositif pour habiliter le detenteur d'un objet portatif tel qu'une carte, a acceder par cette carte a au moins un service dispense par au moins un organisme habilitant
GB8304876D0 (en) * 1983-02-22 1983-03-23 British Telecomm Verification of electronic transactions
EP0118995A1 (fr) * 1983-02-22 1984-09-19 BRITISH TELECOMMUNICATIONS public limited company Production de clés d'identification
JPS59226935A (ja) * 1983-06-01 1984-12-20 アメリカン・エクスプレス・カンパニ− 携帯用情報カ−ドの保護装置
FR2549989B1 (fr) * 1983-07-29 1985-09-13 Philips Ind Commerciale Systeme d'authentification entre un lecteur de carte et une carte de paiement echangeant des informations
DE3336717A1 (de) * 1983-10-08 1985-04-25 Dai Nippon Printing Co., Ltd., Tokio/Tokyo Verfahren und vorrichtung zur kontaktlosen, elektromagnetischen hin- und rueckuebertragung von steuerbefehlen und daten
JPS6084686A (ja) * 1983-10-17 1985-05-14 Toshiba Corp 情報記録媒体の記録方式
FR2557715B1 (fr) * 1983-12-30 1987-07-17 Bull Sa Procede et systeme pour traiter de facon confidentielle des informations stockees sur une piste d'enregistrement a lecture optique d'un support portatif
JPS60159992A (ja) * 1984-01-31 1985-08-21 Toshiba Corp 取引システム
US4609777A (en) * 1984-02-22 1986-09-02 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4599489A (en) * 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4650975A (en) * 1984-08-30 1987-03-17 Casio Computer Co., Ltd. IC card and an identification system thereof
JPS61143872A (ja) * 1984-08-30 1986-07-01 Casio Comput Co Ltd Icカード照合システム
US4866666A (en) * 1984-10-29 1989-09-12 Francisco Michael H Method for maintaining data integrity during information transmission by generating indicia representing total number of binary 1's and 0's of the data
JPS61109169A (ja) * 1984-10-31 1986-05-27 エヌ・シー・アール・コーポレーション Pos端末装置の顧客情報入力システム
US4694492A (en) * 1984-11-09 1987-09-15 Pirmasafe, Inc. Computer communications security control system
US4691355A (en) * 1984-11-09 1987-09-01 Pirmasafe, Inc. Interactive security control system for computer communications and the like
US5367572A (en) * 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
US4720860A (en) * 1984-11-30 1988-01-19 Security Dynamics Technologies, Inc. Method and apparatus for positively identifying an individual
US4998279A (en) * 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US5168520A (en) * 1984-11-30 1992-12-01 Security Dynamics Technologies, Inc. Method and apparatus for personal identification
US4634845A (en) * 1984-12-24 1987-01-06 Ncr Corporation Portable personal terminal for use in a system for handling transactions
US4689478A (en) * 1984-12-24 1987-08-25 Ncr Corporation System for handling transactions including a portable personal terminal
US4650978A (en) * 1985-01-23 1987-03-17 Rmh Systems, Inc. Off line cash card system and method
JPS61195459A (ja) * 1985-02-26 1986-08-29 Nec Corp 有料情報受信装置
JPS61210488A (ja) * 1985-03-14 1986-09-18 Toppan Moore Co Ltd Icカ−ド
FR2583543B1 (fr) * 1985-06-12 1987-09-04 Lefevre Jean Pierre Appareil a signer informatique
FR2608800A2 (fr) * 1985-06-13 1988-06-24 Brechet Michel Carte electronique de commande codable et auto-validable
CA1270339A (fr) * 1985-06-24 1990-06-12 Katsuya Nakagawa Dispositif pour determiner l'exactitude d'un logiciel dans un appareil de traitement de donnees
USRE34161E (en) * 1985-10-04 1993-01-12 Nintendo Company Limited Memory cartridge and information processor unit using such cartridge
JPH074449B2 (ja) * 1985-10-04 1995-01-25 任天堂株式会社 ゲ−ム機用カ−トリツジとそれを用いるゲ−ム機
US4799061A (en) * 1985-11-18 1989-01-17 International Business Machines Corporation Secure component authentication system
FR2601795B1 (fr) * 1986-07-17 1988-10-07 Bull Cp8 Procede pour diversifier une cle de base et pour authentifier une cle ainsi diversifiee comme ayant ete elaboree a partir d'une cle de base predeterminee, et systeme pour la mise en oeuvre
ATE175512T1 (de) * 1986-09-02 1999-01-15 Pitney Bowes Inc Transaktionssystem mit modularem drucker
GB8621333D0 (en) * 1986-09-04 1986-10-15 Manitoba Telephone System Key management system
US4969188A (en) * 1987-02-17 1990-11-06 Gretag Aktiengesellschaft Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
JPS63229541A (ja) * 1987-03-04 1988-09-26 シーメンス、アクチエンゲルシヤフト データ交換システム
DE3885916D1 (de) * 1987-03-04 1994-01-13 Siemens Nixdorf Inf Syst Datenaustauschsystem mit mehreren jeweils eine Chipkarten-Leseeinrichtung enthaltenden Benutzerterminals.
JP2629184B2 (ja) * 1987-04-21 1997-07-09 カシオ計算機株式会社 Icカード認証システム
US5140634A (en) * 1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages
EP0320489A3 (en) * 1987-12-07 1990-03-28 Automations & Informat Systeme Method to increase ic-card security, and ic-card making use of this method
US4992783A (en) * 1988-04-04 1991-02-12 Motorola, Inc. Method and apparatus for controlling access to a communication system
US4964163A (en) * 1988-04-04 1990-10-16 Motorola, Inc. Method and apparatus for controlling access to a communication system
US4935961A (en) * 1988-07-27 1990-06-19 Gargiulo Joseph L Method and apparatus for the generation and synchronization of cryptographic keys
US5007085A (en) * 1988-10-28 1991-04-09 International Business Machines Corporation Remotely sensed personal stylus
EP0400441B1 (fr) * 1989-05-30 1994-07-27 Siemens Nixdorf Informationssysteme Aktiengesellschaft Méthode pour tester un terminal communiquant avec des cartes à puce
FR2651347A1 (fr) * 1989-08-22 1991-03-01 Trt Telecom Radio Electr Procede de generation de nombre unique pour carte a microcircuit et application a la cooperation de la carte avec un systeme hote.
US6926200B1 (en) 1989-09-06 2005-08-09 Fujitsu Limited Electronic cashless system
US6003767A (en) * 1989-09-06 1999-12-21 Fujitsu Limited Cashless medium for an electronic cashless system
US6003762A (en) * 1989-09-06 1999-12-21 Fujitsu Limited Transaction terminal for an electronic cashless system
US5120939A (en) * 1989-11-09 1992-06-09 At&T Bell Laboratories Databaseless security system
US5130519A (en) * 1990-01-16 1992-07-14 George Bush Portable pin card
US5263164A (en) * 1991-01-09 1993-11-16 Verifone, Inc. Method and structure for determining transaction system hardware and software configurations
US5237614A (en) * 1991-06-07 1993-08-17 Security Dynamics Technologies, Inc. Integrated network security system
DE4142964C2 (de) * 1991-12-24 2003-05-08 Gao Ges Automation Org Datenaustauschsystem mit Überprüfung der Vorrichtung auf Authentisierungsstatus
US5313639A (en) * 1992-06-26 1994-05-17 George Chao Computer with security device for controlling access thereto
US5361062A (en) * 1992-11-25 1994-11-01 Security Dynamics Technologies, Inc. Personal security system
DE4339460C1 (de) * 1993-11-19 1995-04-06 Siemens Ag Verfahren zur Authentifizierung eines Systemteils durch ein anderes Systemteil eines Informationsübertragungssystems nach dem Challenge-and Response-Prinzip
ES2101607T3 (es) * 1994-01-27 1997-07-01 Sc Info & Inno Technologie Inf Metodo de autentificacion.
US5478994A (en) * 1994-07-13 1995-12-26 Rahman; Sam Secure credit card which prevents unauthorized transactions
US5627355A (en) * 1994-07-13 1997-05-06 Rahman; Sam Transaction device, equipment and method for protecting account numbers and their associated personal identification numbers
US5587575A (en) * 1994-08-11 1996-12-24 Spescom (Proprietary) Limited Identification of vehicles including code comparison
EP0717337B1 (fr) * 1994-12-13 2001-08-01 International Business Machines Corporation Méthode et système de distribution sécurisé de logiciels
US5619574A (en) * 1995-02-13 1997-04-08 Eta Technologies Corporation Personal access management system
US5692049A (en) * 1995-02-13 1997-11-25 Eta Technologies Corporation Personal access management system
US5689564A (en) * 1995-02-13 1997-11-18 Eta Technologies Corporation Personal access management system
US5682428A (en) * 1995-02-13 1997-10-28 Eta Technologies Corporation Personal access management system
US5694472A (en) * 1995-02-13 1997-12-02 Eta Technologies Corporation Personal access management system
US5610980A (en) * 1995-02-13 1997-03-11 Eta Technologies Corporation Method and apparatus for re-initializing a processing device and a storage device
US5696825A (en) * 1995-02-13 1997-12-09 Eta Technologies Corporation Personal access management system
US5778068A (en) * 1995-02-13 1998-07-07 Eta Technologies Corporation Personal access management system
NL1000352C2 (nl) * 1995-05-12 1996-11-13 Nederland Ptt Elektronisch betaalsysteem met verschillende rekeneenheden, elektronisch betaalmiddel alsmede werkwijze voor elektronisch betalen.
FR2739737B1 (fr) * 1995-10-09 1997-11-21 Inside Technologies Perfectionnements aux cartes a memoire
US6071191A (en) * 1995-11-22 2000-06-06 Nintendo Co., Ltd. Systems and methods for providing security in a video game system
US6190257B1 (en) 1995-11-22 2001-02-20 Nintendo Co., Ltd. Systems and method for providing security in a video game system
JP2744216B2 (ja) * 1996-01-08 1998-04-28 株式会社東芝 Icカード
AU2802797A (en) * 1996-04-15 1997-11-19 Jerry R. Martinez Method and apparatus for validating credit information during home delivery of order
US20030195846A1 (en) 1996-06-05 2003-10-16 David Felger Method of billing a purchase made over a computer network
US8229844B2 (en) 1996-06-05 2012-07-24 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network
US7555458B1 (en) 1996-06-05 2009-06-30 Fraud Control System.Com Corporation Method of billing a purchase made over a computer network
FR2753556B1 (fr) * 1996-09-13 1998-11-13 Schlumberger Ind Sa Methode d'authentification de cartes
US5844497A (en) * 1996-11-07 1998-12-01 Litronic, Inc. Apparatus and method for providing an authentication system
US6367017B1 (en) 1996-11-07 2002-04-02 Litronic Inc. Apparatus and method for providing and authentication system
US6268788B1 (en) 1996-11-07 2001-07-31 Litronic Inc. Apparatus and method for providing an authentication system based on biometrics
FR2755809B1 (fr) * 1996-11-13 1999-05-28 Thomson Multimedia Sa Procede de protection d'information transmise d'un element de securite vers un decodeur et systeme de protection utilisant un tel procede
US6075860A (en) * 1997-02-19 2000-06-13 3Com Corporation Apparatus and method for authentication and encryption of a remote terminal over a wireless link
JP4006796B2 (ja) 1997-11-17 2007-11-14 株式会社日立製作所 個人情報管理方法および装置
FI20000194A0 (fi) * 2000-01-31 2000-01-31 Jarkko Valtanen Menetelmä kaupankäynnissä
DE60133453T2 (de) 2000-02-18 2009-05-07 Cypak Ab Verfahren und vorrichtung zur identifizierung und authentisierung
US7222359B2 (en) * 2001-07-27 2007-05-22 Check Point Software Technologies, Inc. System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices
JP2003087238A (ja) * 2001-09-11 2003-03-20 Hitachi Ltd 家庭内ネットワークにおけるセキュリティ実現方式
CN100337502C (zh) * 2004-07-28 2007-09-12 华为技术有限公司 一种在设备中逻辑绑定和验证器件的方法
US8914310B2 (en) * 2009-01-29 2014-12-16 A Major Difference, Inc. Multi-functional control unit for an ionic foot bath system
US20110054572A1 (en) * 2009-07-29 2011-03-03 A Major Difference, Inc. Therapeutic electrolysis device with replaceable ionizer unit
US20110189600A1 (en) 2010-01-29 2011-08-04 Lars Plumer Method for automated control of processing parameters
US20110188066A1 (en) * 2010-01-29 2011-08-04 Lars Plumer Processor system with provision for automated control of processing parameters
US20110189611A1 (en) * 2010-01-29 2011-08-04 Lars Plumer Plate recognition system for automated control of processing parameters
US10694352B2 (en) 2015-10-28 2020-06-23 Activision Publishing, Inc. System and method of using physical objects to control software access

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3764742A (en) * 1971-12-23 1973-10-09 Ibm Cryptographic identification system
US3806874A (en) * 1972-04-11 1974-04-23 Gretag Ag Identification system for individuals
CH604285A5 (fr) * 1977-03-04 1978-09-15 Landis & Gyr Ag
FR2394131A1 (fr) * 1977-06-07 1979-01-05 Cii Honeywell Bull Systeme de traitement d'informations protegeant le secret d'informations confidentielles
GB2011671A (en) * 1977-12-30 1979-07-11 Ibm Terminal device
FR2415340A1 (fr) * 1978-01-19 1979-08-17 Datasaab Ab Systeme d'identification personnelle
FR2417141A1 (fr) * 1978-02-09 1979-09-07 Travaux Indls Pour Electricite Systeme de controle par reconnaissance automatique d'un objet marque
GB2020074A (en) * 1978-04-26 1979-11-07 Omron Tateisi Electronics Co Card vertification system using stored functions

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3594727A (en) * 1968-04-16 1971-07-20 Edward L Braun Credit card banking system
US3906460A (en) * 1973-01-11 1975-09-16 Halpern John Wolfgang Proximity data transfer system with tamper proof portable data token
FR2304965A2 (fr) * 1974-03-25 1976-10-15 Innovation Ste Int Procede et dispositif de commande electronique
US3971916A (en) * 1974-03-25 1976-07-27 Societe Internationale Methods of data storage and data storage systems
US3978320A (en) * 1975-02-20 1976-08-31 Mcbride Jr W Neil Data control devices
US4023013A (en) * 1975-12-29 1977-05-10 Diebold, Incorporated On-line verification system for identification card or the like
FR2383485A1 (fr) * 1977-03-11 1978-10-06 Diebold Inc Systeme de verification, directement connecte pour carte d'identification ou similaire
US4123747A (en) * 1977-05-20 1978-10-31 International Business Machines Corporation Identity verification method and apparatus
US4234932A (en) * 1978-09-05 1980-11-18 Honeywell Information Systems Inc. Security system for remote cash dispensers

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3764742A (en) * 1971-12-23 1973-10-09 Ibm Cryptographic identification system
US3806874A (en) * 1972-04-11 1974-04-23 Gretag Ag Identification system for individuals
CH604285A5 (fr) * 1977-03-04 1978-09-15 Landis & Gyr Ag
FR2394131A1 (fr) * 1977-06-07 1979-01-05 Cii Honeywell Bull Systeme de traitement d'informations protegeant le secret d'informations confidentielles
GB2011671A (en) * 1977-12-30 1979-07-11 Ibm Terminal device
FR2415340A1 (fr) * 1978-01-19 1979-08-17 Datasaab Ab Systeme d'identification personnelle
FR2417141A1 (fr) * 1978-02-09 1979-09-07 Travaux Indls Pour Electricite Systeme de controle par reconnaissance automatique d'un objet marque
GB2020074A (en) * 1978-04-26 1979-11-07 Omron Tateisi Electronics Co Card vertification system using stored functions

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE38419E1 (en) 1986-05-13 2004-02-10 Ncr Corporation Computer interface device

Also Published As

Publication number Publication date
IT8025313A0 (it) 1980-10-14
JPS5911950B2 (ja) 1984-03-19
IT1150969B (it) 1986-12-17
JPS5680769A (en) 1981-07-02
EP0029894A3 (en) 1981-07-15
US4295039A (en) 1981-10-13
EP0029894A2 (fr) 1981-06-10
CA1129028A (fr) 1982-08-03
DE3069942D1 (en) 1985-02-21

Similar Documents

Publication Publication Date Title
EP0029894B1 (fr) Système pour réaliser une vérification sûre d'un mot de passe
US4386266A (en) Method for operating a transaction execution system having improved verification of personal identification
US4259720A (en) Security system for electronic funds transfer system
US4408203A (en) Security system for electronic funds transfer system
US4357529A (en) Multilevel security apparatus and method
EP0032193B1 (fr) Appareil de communication
US4304990A (en) Multilevel security apparatus and method
US4328414A (en) Multilevel security apparatus and method
EP0385400B1 (fr) Appareil et méthode à plusieurs niveaux de sécurité avec clef personnelle
EP0007002B1 (fr) Systèmes de terminaux de transactions avec authentification d'un utilisateur potentiel
US5485519A (en) Enhanced security for a secure token code
US4890323A (en) Data communication systems and methods
US5193114A (en) Consumer oriented smart card system and authentication techniques
US4746788A (en) Identification system for authenticating both IC card and terminal
US4529870A (en) Cryptographic identification, financial transaction, and credential device
US5513261A (en) Key management scheme for use with electronic cards
US4471216A (en) System and process for identification of persons requesting access to particular facilities
US4885788A (en) IC card
EP0189476B1 (fr) Systeme et procede de securite pour reseau de terminaux a distance
JPS645783B2 (fr)
JPS61139878A (ja) 電子資金転送装置の安全保護モジユ−ル
JPH06501324A (ja) スマートカード妥当性検証装置および方法
US20060157553A1 (en) Accommodating multiple users of a secure credit card
JPS6133574A (ja) 物の電子的に正当と認定される確認方法および装置
US20020013904A1 (en) Remote authentication for secure system access and payment systems

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Designated state(s): DE FR GB

AK Designated contracting states

Designated state(s): DE FR GB

17P Request for examination filed

Effective date: 19811216

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Designated state(s): DE FR GB

REF Corresponds to:

Ref document number: 3069942

Country of ref document: DE

Date of ref document: 19850221

ET Fr: translation filed
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 19940930

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19941026

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 19951018

Year of fee payment: 16

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Effective date: 19960628

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Effective date: 19960702

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Effective date: 19961007

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 19961007